1 | package com.nailabs.abac.credential; |
---|
2 | |
---|
3 | import java.util.*; |
---|
4 | |
---|
5 | import com.nailabs.abac.process.FrontierManager; |
---|
6 | import com.nailabs.abac.process.AckPolicy; |
---|
7 | import com.nailabs.abac.process.AckFact; |
---|
8 | import com.nailabs.abac.process.ACPolicy; |
---|
9 | import com.nailabs.abac.process.ResourcePolicy; |
---|
10 | import edu.stanford.peer.rbtm.credential.Entity; |
---|
11 | import edu.stanford.peer.rbtm.credential.EntityExpression; |
---|
12 | import edu.stanford.peer.rbtm.credential.RoleName; |
---|
13 | import edu.stanford.peer.rbtm.credential.SimpleRoleName; |
---|
14 | import edu.stanford.peer.rbtm.credential.StaticCredential; |
---|
15 | import edu.stanford.peer.rbtm.engine.Simp; |
---|
16 | import edu.stanford.peer.rbtm.engine.Sens; |
---|
17 | import edu.stanford.peer.rbtm.engine.Oppo; |
---|
18 | import edu.stanford.rt.credential.*; |
---|
19 | import edu.stanford.rt.parser.RTParser; |
---|
20 | import edu.stanford.rt.util.Constants; |
---|
21 | |
---|
22 | /** |
---|
23 | * A frontier manager class which uses the application specification |
---|
24 | * domain for determining whether a rol is issuer traces all, issuer |
---|
25 | * traces def, etc. |
---|
26 | */ |
---|
27 | public class RtmlFrontier extends FrontierManager implements Constants { |
---|
28 | protected HashMap discoveryConfig; |
---|
29 | |
---|
30 | protected ApplicationDomain domain; |
---|
31 | |
---|
32 | protected CredentialStore store; |
---|
33 | |
---|
34 | protected RTContext context; |
---|
35 | |
---|
36 | protected HashID id = null; |
---|
37 | |
---|
38 | //protected HashSet issuerTracesAll = new HashSet(); |
---|
39 | |
---|
40 | protected HashSet issuerTraces = new HashSet(); |
---|
41 | |
---|
42 | //protected HashSet issuerTracesDef = new HashSet(); |
---|
43 | |
---|
44 | protected ResourcePolicy resourcePolicy = null; |
---|
45 | |
---|
46 | public RtmlFrontier(HashMap config) { |
---|
47 | String domainName = getApplicationDomainName(config); |
---|
48 | discoveryConfig = new HashMap(2); // needed for constructing a DDEngine |
---|
49 | discoveryConfig.put("DDEParser", config.get("DDEParser")); |
---|
50 | discoveryConfig.put("PrepInfo", config.get("PrepInfo")); |
---|
51 | discoveryConfig.put("DDEContext", config.get("DDEContext")); |
---|
52 | store = (CredentialStore)config.get("CredentialStore"); |
---|
53 | context = (RTContext)config.get("RTContext"); |
---|
54 | id = new HashID(HashID.APPLICATION_DOMAIN, domainName); |
---|
55 | domain = context.getApplicationDomain(id); |
---|
56 | init(config); |
---|
57 | } |
---|
58 | |
---|
59 | /** specialized init method for accessing the credential store backends */ |
---|
60 | public void init(HashMap config) { |
---|
61 | // (0) get the configurations entity identifier |
---|
62 | this.self =(Entity) config.get("EntityID"); |
---|
63 | |
---|
64 | // (1) load acknowledgement(ACK) policy |
---|
65 | ackPolicy = (AckPolicy)config.get("AckPolicy"); |
---|
66 | |
---|
67 | // (2) load access control (AC) policy |
---|
68 | acPolicy = (ACPolicy)config.get("AccessControl"); |
---|
69 | // (2 and 1/2) load the resource policy |
---|
70 | resourcePolicy = (ResourcePolicy)config.get("ResourcePolicy"); |
---|
71 | |
---|
72 | // (3) load issuer traceable roles |
---|
73 | // (4) load subject traceale roles |
---|
74 | parseRoleDeclarations(config); |
---|
75 | |
---|
76 | // (5) construct sensitive roles predicate from the ack policy |
---|
77 | Sens sens = new Sens(ackPolicy.getSensitiveRoles()); |
---|
78 | |
---|
79 | // (6) construct opponent predicate from the issuer traceable roles |
---|
80 | Oppo oppo = new Oppo(new Vector(issuerTracesDef)); |
---|
81 | oppo.addSubjects(new Vector(issuerTracesAll)); |
---|
82 | |
---|
83 | // TBD: Does this really need to be separated into two mutually |
---|
84 | // exclusive credential sets? And in this case we have three |
---|
85 | // credential stores (the primordial, issuer-traces, and |
---|
86 | // subject-traces). |
---|
87 | |
---|
88 | // (8) separate policy reachable credentials |
---|
89 | // (9) separate self reachable credentials |
---|
90 | CredentialStore store = (CredentialStore)config.get("CredentialStore"); |
---|
91 | CredentialStore subjectStore = null, issuerStore = null; |
---|
92 | try { |
---|
93 | RTParser parser = new RTParser(); |
---|
94 | subjectStore = new CredentialStore(parser); |
---|
95 | issuerStore = new CredentialStore(parser); |
---|
96 | Iterator domains = |
---|
97 | store.getCredentialDomains().values().iterator(); |
---|
98 | while(domains.hasNext()) { |
---|
99 | CredentialDomain domain = (CredentialDomain)domains.next(); |
---|
100 | RoleDefinition def = |
---|
101 | (RoleDefinition)domain.roleDefinitionIterator().next(); |
---|
102 | RoleName roleName = |
---|
103 | new SimpleRoleName(def.getHead().getName()); |
---|
104 | if(isIssuerTraceable(roleName)) { |
---|
105 | issuerStore.addCredentialDomain(domain.getHashID(),domain); |
---|
106 | } else { |
---|
107 | //if(isSubjectTraceable(roleName)) { |
---|
108 | subjectStore.addCredentialDomain(domain.getHashID(),domain); |
---|
109 | } |
---|
110 | // It is possible that credential may fall through to here. We |
---|
111 | // propbably just remove the second if-statement... |
---|
112 | } |
---|
113 | } catch (Exception ex) { |
---|
114 | ex.printStackTrace(); |
---|
115 | } |
---|
116 | |
---|
117 | // (7) construct the frontier functions with their predicates |
---|
118 | oppoLocal = new RtmlEngine(issuerStore); |
---|
119 | System.out.println("------> Sensitive Graph"); |
---|
120 | sensFrontier = new RtmlEngine(subjectStore, sens); |
---|
121 | System.out.println("------> Opponent Graph"); |
---|
122 | oppoFrontier = new RtmlEngine(issuerStore, oppo); |
---|
123 | System.out.println("------> Simple Graph"); |
---|
124 | simpFrontier = new RtmlEngine(subjectStore, new Simp()); |
---|
125 | |
---|
126 | // perform credential discovery here |
---|
127 | DDEngine selfTraceable = discoverSelfTraceable(); |
---|
128 | DDEngine policyTraceable = discoverPolicyTraceable(); |
---|
129 | // TBD: add backwards compatibility check in here if necessary |
---|
130 | // which would avoid discovery |
---|
131 | ((RtmlEngine)oppoLocal).importDomains(policyTraceable); |
---|
132 | ((RtmlEngine)sensFrontier).importDomains(selfTraceable); |
---|
133 | ((RtmlEngine)oppoFrontier).importDomains(policyTraceable); |
---|
134 | ((RtmlEngine)simpFrontier).importDomains(selfTraceable); |
---|
135 | } |
---|
136 | |
---|
137 | |
---|
138 | protected String getApplicationDomainName(HashMap config) { |
---|
139 | Properties props = (Properties)config.get("RTML"); |
---|
140 | return props.getProperty("ApplicationDomain"); |
---|
141 | } |
---|
142 | |
---|
143 | protected OrderedMap getRoleDeclarations() { |
---|
144 | try { |
---|
145 | return domain.getRoleDeclarations(); |
---|
146 | } catch(Exception ex) { |
---|
147 | ex.printStackTrace(); |
---|
148 | } |
---|
149 | return null; |
---|
150 | } |
---|
151 | |
---|
152 | |
---|
153 | public DDEngine discoverPolicyTraceable() { |
---|
154 | Iterator ackValues = ackPolicy.getRequiredRoles().iterator(); |
---|
155 | Iterator acValues = acPolicy.getRequiredRoles().iterator(); |
---|
156 | Iterator resourceValues = resourcePolicy.getRequiredRoles().iterator(); |
---|
157 | DDEngine discoveryEngine = new DDEngine(discoveryConfig); |
---|
158 | HashSet policySet = new HashSet(); |
---|
159 | |
---|
160 | while(ackValues.hasNext()) { |
---|
161 | AckFact ackVal = (AckFact)ackValues.next(); |
---|
162 | policySet.add(ackVal.getRequirement()); |
---|
163 | } |
---|
164 | while(acValues.hasNext()) { |
---|
165 | EntityExpression acVal = (EntityExpression)acValues.next(); |
---|
166 | policySet.add(acVal); |
---|
167 | } |
---|
168 | while(resourceValues.hasNext()) { |
---|
169 | EntityExpression resourceVal = |
---|
170 | (EntityExpression)resourceValues.next(); |
---|
171 | policySet.add(resourceVal); |
---|
172 | } |
---|
173 | Iterator randomRoles = policySet.iterator(); |
---|
174 | while(randomRoles.hasNext()) { |
---|
175 | EntityExpression random = (EntityExpression)randomRoles.next(); |
---|
176 | discoveryEngine.backwardSearch(random); |
---|
177 | } |
---|
178 | return discoveryEngine; |
---|
179 | } |
---|
180 | |
---|
181 | public DDEngine discoverSelfTraceable() { |
---|
182 | HashSet selfSet = new HashSet(); |
---|
183 | Iterator mySensRoles = ackPolicy.getSensitiveRoles().iterator(); |
---|
184 | DDEngine discoveryEngine = new DDEngine(discoveryConfig); |
---|
185 | //RtmlEngine local = new RtmlEngine(store); |
---|
186 | |
---|
187 | //find all the credentials which have roles that map directly to self |
---|
188 | Iterator myRoles = oppoFrontier.findCredentialsBySubject(self); |
---|
189 | while(myRoles.hasNext()) { |
---|
190 | RtmlCredential cred = (RtmlCredential)myRoles.next(); |
---|
191 | EntityExpression me = cred.getDefinedRole(); |
---|
192 | selfSet.add(me); |
---|
193 | } |
---|
194 | myRoles = sensFrontier.findCredentialsBySubject(self); |
---|
195 | while(myRoles.hasNext()) { |
---|
196 | RtmlCredential cred = (RtmlCredential)myRoles.next(); |
---|
197 | EntityExpression me = cred.getDefinedRole(); |
---|
198 | selfSet.add(me); |
---|
199 | } |
---|
200 | //add the sensitive roles to the initial search set |
---|
201 | while(mySensRoles.hasNext()) { |
---|
202 | EntityExpression sense = (EntityExpression)mySensRoles.next(); |
---|
203 | selfSet.add(sense); |
---|
204 | } |
---|
205 | //perform forward searches on the pseudo-random set of roles |
---|
206 | Iterator randomRoles = selfSet.iterator(); |
---|
207 | while(randomRoles.hasNext()) { |
---|
208 | EntityExpression random = (EntityExpression)randomRoles.next(); |
---|
209 | discoveryEngine.forwardSearch(random); |
---|
210 | } |
---|
211 | return discoveryEngine; |
---|
212 | } |
---|
213 | |
---|
214 | |
---|
215 | protected void parseRoleDeclarations(HashMap config) { |
---|
216 | // TBD: revisit to make this more robust in case an error occurs. |
---|
217 | // it should not necessarily bail out of all role processing |
---|
218 | try { |
---|
219 | OrderedMap map = getRoleDeclarations(); |
---|
220 | Iterator keys = map.keyIterator(); |
---|
221 | System.out.println("Frontier parsing role declaratons"); |
---|
222 | while(keys.hasNext()) { |
---|
223 | RoleDeclaration role = (RoleDeclaration)map.get(keys.next()); |
---|
224 | System.out.println("role = " + role.getName()); |
---|
225 | parseRoleDeclaration(role); |
---|
226 | System.out.println(); |
---|
227 | } |
---|
228 | } catch(Exception ex) { |
---|
229 | ex.printStackTrace(); |
---|
230 | } |
---|
231 | System.out.println("End declaration parsing!"); |
---|
232 | config.put("IssuerTracesAll", issuerTracesAll); |
---|
233 | config.put("IssuerTracesDef", issuerTracesDef); |
---|
234 | config.put("SubjectTraceable", subjectTraces); |
---|
235 | } |
---|
236 | |
---|
237 | protected void parseRoleDeclaration(RoleDeclaration declaration) { |
---|
238 | int issuerValue = declaration.getIssuerTracesType(); |
---|
239 | int subjectValue = declaration.getSubjectTracesType(); |
---|
240 | |
---|
241 | if(issuerValue == ISSUER_TRACES_ALL) { |
---|
242 | issuerTracesAll.add(declaration.getName()); |
---|
243 | System.out.print("issuer_traces_all"); |
---|
244 | } |
---|
245 | if(issuerValue == ISSUER_TRACES_DEF) { |
---|
246 | issuerTracesDef.add(declaration.getName()); |
---|
247 | System.out.print("issuer_traces_def"); |
---|
248 | } |
---|
249 | if(subjectValue == SUBJECT_TRACES_ALL) { |
---|
250 | subjectTraces.add(declaration.getName()); |
---|
251 | System.out.print("subject_traces_all"); |
---|
252 | } |
---|
253 | } |
---|
254 | |
---|
255 | private RoleDeclaration getRoleDeclaration(RoleName role) { |
---|
256 | try { |
---|
257 | System.out.println("id = " + id); |
---|
258 | return domain.lookupRoleDeclaration(role.getName()); |
---|
259 | } catch(Exception ex) { |
---|
260 | ex.printStackTrace(); |
---|
261 | } |
---|
262 | return null; |
---|
263 | } |
---|
264 | |
---|
265 | /** Is the specified credential policy traceable? */ |
---|
266 | public boolean isPolicyTraceable(StaticCredential cred) { |
---|
267 | return isIssuerTraceable(cred.getDefinedRole().getName()); |
---|
268 | } |
---|
269 | |
---|
270 | /** Can the specified credential be traced back to this negotiator? */ |
---|
271 | public boolean isSelfReachable(StaticCredential cred) { |
---|
272 | return isSubjectTraceable(cred.getDefinedRole().getName()); |
---|
273 | } |
---|
274 | |
---|
275 | public boolean isIssuerTraceable(RoleName role) { |
---|
276 | int value = getRoleDeclaration(role).getIssuerTracesType(); |
---|
277 | return (value == ISSUER_TRACES_ALL || value == ISSUER_TRACES_DEF); |
---|
278 | } |
---|
279 | |
---|
280 | public boolean isIssuerTracesAll(RoleName role) { |
---|
281 | int value = getRoleDeclaration(role).getIssuerTracesType(); |
---|
282 | return (value == ISSUER_TRACES_ALL); |
---|
283 | } |
---|
284 | |
---|
285 | public boolean isIssuerTracesDef(RoleName role) { |
---|
286 | int value = getRoleDeclaration(role).getIssuerTracesType(); |
---|
287 | return (value == ISSUER_TRACES_DEF); |
---|
288 | } |
---|
289 | |
---|
290 | public boolean isSubjectTraceable(RoleName role) { |
---|
291 | int value = getRoleDeclaration(role).getSubjectTracesType(); |
---|
292 | return (value == SUBJECT_TRACES_ALL); |
---|
293 | } |
---|
294 | |
---|
295 | public boolean subjectTracesAll(RoleName role) { |
---|
296 | int value = getRoleDeclaration(role).getSubjectTracesType(); |
---|
297 | return (value == SUBJECT_TRACES_ALL); |
---|
298 | } |
---|
299 | |
---|
300 | |
---|
301 | } |
---|